We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It's a firewall that secures our internal network. I have been using it since 2013, and I find that most of the features are advanced, and very user friendly."
"The reporting and monitoring are very good."
"The features that we have found most valuable are the SSL VPN and the User Portal."
"The most valuable feature of this solution is Quota."
"Fortigate's most valuable feature is that it doesn't need a push policy when writing rules."
"Initial setup is straightforward. There weren't too many issues with setting it up. It takes one hour or so."
"Easy to use support and licensing portal as well as activation process."
"The reporting you receive out of this appliance is excellent. You will not need an external management system."
"It's a high-performance device. The network performance is also really good. We check how much time it takes for the servers. Our network performance has increased since using this solution."
"The most valuable feature of this solution is that you can start off with a simple firewall and expand it to UTM."
"The most valuable features are the VPN Blade, IPS Blade, the URL filtering, and the Applications Control Blade."
"The versatility is the solution's most valuable feature."
"The most valuable feature is that we can use the same manager server that we use on our own Check Point firewalls. We integrated CloudGuard on that manager and we can use the same kind of protections that we use on the on-prem firewalls, like the IPS and antivirus policy. We can have the same kind of protection on the Cloud environment that we have on-premise."
"Auto-scaling and zero touch are valuable features."
"Moving into the cloud without having to change a lot of our internal processes and retrain staff is one of the biggest benefits of this solution."
"When browsing, it scans sites to ensure that they are safe and that no harm can be caused."
"The security capabilities are okay."
"The solution is excellent for web and application filtering and remote access with the VPN."
"The solution is easy to use."
"I believe it's the advanced security software that offers SMPP protection for the agent."
"The tool is stable."
"The interface is user-friendly."
"The user interface is well laid out and understandable."
"The most valuable feature is the solution is easy to configure for users."
"Fortinet Fortigate could benefit by simplifying some of their processes."
"It would be nice if backups could more easily migrate between different models."
"Performance and technical support are the main issues with this solution."
"The debugging and troubleshooting has room for improvement."
"Lacks sufficient security options."
"I would like to see improvements in the product's application rules."
"There are some complex administration tasks in their administration portal. That needs to be improved."
"I would like to see more advanced developments of a wireless controller in the future."
"There is room for improvement in the integration with PaaS services from the public cloud. It would be very helpful."
"The licensing structure is unclear, so a transparent and flexible licensing structure would be preferable."
"The initial setup was a bit complex."
"In the next release, including VRF support would be highly beneficial."
"I would like to see more focus on east-west traffic inspection and AWS."
"With the incorporation of a lot of AI and machine learning, they can build some sort of a matrix for low-level threats or low-level things that require attention. There can be automation of those tasks so that we don't have to take more time and effort. There should be machine learning to eliminate level-one types of tasks."
"Greater automation would reduce the need for manual configuration and management."
"Easier optimization techniques can definitely help with better performance of the OS, as using the vanilla software doesn't actually showcase the real capability of the software."
"The solution had a feature to import users from a CSV file. However, the latest version does not have that option."
"There are some issues with logs and report limitations."
"I don't know whether this will be included in an upgrade, but I would like to get the user utility, like seeing where the users are using more of the data."
"The implementation policy needs improvment."
"The reporting part could be more user-friendly for troubleshooting and identifying network issues. It should be more easy for a normal user to identify the problem in their network."
"I would like to see a better content management pack and also the website searching should be better."
"The solution should improve its scalability because it cannot support enterprise networks."
"I would like to see improvements in the development of reports. The process needs to be made simple."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 119 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Sophos XG. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.